Lexmark Markvision Enterprise Remote Command Execution

Critical Nessus Plugin ID 66328


The remote web server has a web application that is affected by a remote command execution vulnerability.


The version of Lexmark Markvision installed on the remote host is earlier than 1.8.0 and gets installed with a Groovy Shell (intended for diagnostic purposes) that binds to TCP port 9789. This could allow for commands to be executed by an unauthenticated, remote attacker.

Note that this plugin does not verify that Groovy Shell is listening and instead only does a version check of Lexmark Markvision install.


Upgrade to Lexmark Markvision 1.8.0 or later.

See Also


Plugin Details

Severity: Critical

ID: 66328

File Name: lexmark_markvision_enterprise_1_8.nasl

Version: $Revision: 1.1 $

Type: remote

Family: Misc.

Published: 2013/05/06

Modified: 2013/05/06

Dependencies: 66326

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:lexmark:markvision

Required KB Items: www/lexmark_markvision_enterprise

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/22

Vulnerability Publication Date: 2013/04/22

Reference Information

CVE: CVE-2013-3055

BID: 59513

OSVDB: 92716